aboutsummaryrefslogtreecommitdiffstats
path: root/utils/src/test/java/org/onap/policy/common/utils/coder/PropertyCoderTest.java
blob: 86f8a1b1abbf8d6e052a022463684fb470e1c487 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
/*
 * ============LICENSE_START=======================================================
 * ONAP
 * ================================================================================
 * Copyright (C) 2019-2020 AT&T Intellectual Property. All rights reserved.
 * ================================================================================
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 * ============LICENSE_END=========================================================
 */

package org.onap.policy.common.utils.coder;

import static org.junit.Assert.assertEquals;

import com.google.gson.annotations.SerializedName;
import java.io.Reader;
import java.io.StringReader;
import java.util.List;
import lombok.Getter;
import org.junit.Before;
import org.junit.Test;

public class PropertyCoderTest {
    private PropertyCoder propertyCoder = null;
    private static final String AES_ENCRYPTION_KEY = "aes_encryption_key";

    /*
     * Note: to generate the encrypted values, invoke CryptoUtils passing both the value
     * to be encrypted and the secret key.
     *
     * The secret key should typically be 32 characters long, resulting in a 256-bit
     * key, and is placed in "aes_encryption_key".
     *
     * For "xacml.pdp.rest.password", the encrypted value was generated via:
     *  java org.onap.policy.common.utils.security.CryptoUtils enc alpha abcdefghijklmnopqrstuvwxyzabcdef
     *
     * For "pass", the encrypted value was generated via:
     *  java org.onap.policy.common.utils.security.CryptoUtils enc hello abcdefghijklmnopqrstuvwxyzabcdef
     */
    private static final String json =
            ("{'aes_encryption_key':'abcdefghijklmnopqrstuvwxyzabcdef'"
            + ",'xacml.pdp.rest.password':'enc:FSfOhDygtmnX3gkMSfTFMoBFW+AG5k6goNj2KZgQmeF0DqgcMg=='"
            + ",'xacml.pdp.rest.user':'testpdp'"
            + ",'xacml.pdp.rest.client.user':'policy'"
            + ",'xacml.pdp.rest.client.password':'policy'"
            + ",'xacml.pdp.rest.environment':'TEST'"
            + ",'servers':[{'name':'server1','port':'10',"
            + "'pass':'enc:08Fj6tLhmWjkZkf52O2A2ZNT8PpL80yEOEKXlbV/gnm0lkR9OA=='}"
            + ",{'name':'server2','port':'20','pass':'plaintext'}]"
            + "}").replace('\'', '"');

    /**
     * Creates a standard object, populated with some data.
     *
     * @throws Exception if an error occurs
     */
    @Before
    public void setUp() throws Exception {
        propertyCoder = new PropertyCoder();
    }

    @Test
    public void testPropertyCoder() {
        MyClass data = propertyCoder.decode(json, AES_ENCRYPTION_KEY, MyClass.class);
        assertEquals("alpha", data.getPdpRestPass());
        assertEquals("hello", data.servers.get(0).pass);
        assertEquals("server1", data.servers.get(0).name);
        assertEquals("10", data.servers.get(0).port);
        assertEquals("plaintext", data.servers.get(1).pass);
    }

    @Test
    public void testPropertyCoderReader() {
        Reader reader = new StringReader(json);
        MyClass data = propertyCoder.decode(reader, AES_ENCRYPTION_KEY, MyClass.class);
        assertEquals("alpha", data.getPdpRestPass());
        assertEquals("hello", data.servers.get(0).pass);
        assertEquals("server1", data.servers.get(0).name);
        assertEquals("10", data.servers.get(0).port);
        assertEquals("plaintext", data.servers.get(1).pass);
    }

    @Getter
    public static class MyClass {
        @SerializedName("aes_encryption_key")
        private String key;
        @SerializedName("xacml.pdp.rest.password")
        private String pdpRestPass;
        @SerializedName("xacml.pdp.rest.user")
        private String pdpRestUser;
        @SerializedName("xacml.pdp.rest.client.user")
        private String pdpClientUser;
        @SerializedName("xacml.pdp.rest.client.password")
        private String pdpClientPass;
        @SerializedName("xacml.pdp.rest.environment")
        private String pdpRestEnv;
        @SerializedName("servers")
        private List<ServerClass> servers;
    }

    public static class ServerClass {
        private String name;
        private String port;
        private String pass;
    }
}